Posts
243
Following
76
Followers
150
Hello there ^^

Just a curious person, these days, mostly working on firmware reverse engineering and postmarketOS.
Don't PM here; PMs are disabled. Instead, reach out via email or IRC/XMPP.
Followers maybe manually approved, please have a bio. More likely to follow-back if we met somewhere else (e.g. IRC).

Note:
*** Fascism, racism, as well as any other kind of bigotry NOT TOLERATED!
*** MDNI/18+ accounts also NOT TOLERATED!
*** You are entering a fascism-FREE zone.
*** Opinions are my own and do not represent those of other projects I am involved in.

#nobot

nina ๐Ÿ”œ 39c3 ๐Ÿ“ž N1NA (6162)

well this is bad

my laptop has just decided to grow scanlines

first i thought it was just the gpu driver crapping itself so i rebooted but it's on bios splash screen and everywhere

3
1
0
I don't register for discounts.
I don't install apps.
If your product requires an app, I'M NOT BUYING IT.
7
6
0
Edited yesterday
Since we're on the topic of Cellebrite: #postmarketOS is NOT vulnerable to UFED.

Among devices that police seized from my friend was Xiaomi Poco F1 (xiaomi-beryllium) running postmarketOS build I pmbootstraped in late January 2024 (without LUKS2). Police seized the device 2 weeks after I gave it to said friend.

They tried to exploit it, but gave up. Mainline Linux kernel (6.6 at the time) did not have vulnerabilities in USB HID drivers (at least none in UFED's database).

To mitigate further against tools such as Cellebrite, we could enable USB authentication which prevents kernel modules from loading prior to user's consent.
Problem with that approach is that Desktop Environments have authentication implemented for Thunderbolt, but not for USB.
https://usbguard.github.io/

I really would like to see SELinux implemented as well, but it would be a Herculean effort because rules would need to be hand-written for Alpine.
7
9
1
Edited 2 days ago

About 1.5 years ago my friend was (falsely) accused of terrorism.

All of their electronic devices were seized, plus my stash of hard drives (stored at their place for reasons).

Of course police didnโ€™t find any evidence. Culprit that impersonated my friend (and many others) got arrested recently (article in Polish).

Police returned the hardware few months ago and I found that all of my drives are now e-waste thanks to their carelessness, which made me (understandably) furious. I even considered suing them.

Said very good friend of mine entrusted me with their personal phone and pattern to unlock it. I charged and booted it for the first time since February 2024 and were curious how it was pwned. I knew police used cellebrite on it.

My crime is that of curiosity

As it turns out, police forgot to clean after themselves (there was an attempt) and left payloads, logs, and backdoor intact.

Took a peek at the first-stage payload but itโ€™s too complex for me to reverse-engineer on my own. Itโ€™s relatively well obfuscated, but I can tell itโ€™s using RNDIS (likely spawning a server?) and TLS-encrypted connection to talk to Cellebrite box.

If youโ€™re a security researcher (or just curious nerd with more spoons than me) and you would like to take a look - here you go.

Payload was uploaded onto the device on 2024-02-21. If you want to re-create the environment it was executed on, you will need a:

  • Samsung Z Flip3 5G (SM-F711B)
  • Android build SP2A_220305.013.F711BXXS2CVHF

Rough execution flow:

1. USB device plugged in (Cellebrite Cheetah)
2. USB controller switches to host mode
3. Gadget switching USB VID/PID to load kernel modules (hid_steam, hid_apple, hid_prodikeys, hid_logitech_hidpp, hid_magicmouse, hid_aksys and tries to exploit quirks)
4. Module 'hid_aksys' leaks memory
5. Screen unlocked
6. ADB key '82:E5:EA:F3:DC:D1:7D:CA:65:3C:D4:58:65:CD:81:8E' added to trusted keys on the device
7. First-stage payload '/data/local/tmp/falcon' copied onto the device.
8. Second-stage payload (seemingly) executed as root:
	- /data/local/tmp/chrome-command-line
	- /data/local/tmp/android-webview-command-line
	- /data/local/tmp/webview-command-line
	- /data/local/tmp/content-shell-command-line
	- /data/local/tmp/frida-server-16.1.4-android-arm64
	- /data/local/tmp/init
9. Data extraction (photos, telegram, firefox, downloads)

Have fun!

27
14
2
Today Software Freedom Conservancy is launching our biggest fundraiser match challenge yet! With a whopping $211,927 from our generous matchers, every dollar you donate until January 15th 2026 will be doubled! This has been a huge year for us and we're so thankful to all the individuals who help sustain our organization.

You can become a sustainer and read more about what we've been up to here:

https://sfconservancy.org/sustainer/#YearInReview
1
3
0

it's missing ๐ŸŽƒ --> 39c3

we get signal. main screen turn on

5
2
0

Eivind (like the Terrible) ๐ŸŽ„

Four bendy buses managed to enter a roundabout at the exact same time from four different directions in Oslo yesterday afternoon and get properly stuck, each bus blocking the exit for the one behind it.

68
7
2
Edited 3 days ago

You meet the users where they are.

You have literally no idea how much this paid off. The number of infected media players people downloaded in the age before Windows Media Player had more than three codecs is unimaginable

Who knows if I saved the entire firm doing this

26
6
0

Barnabรกs Czรฉmรกn

I think it is time to cancel Xiaomi products, since HyperOS the bootloader unlock is nearly impossible.

1
1
0

๐Ÿ‡จ๐Ÿ‡ฆSamuel Proulx๐Ÿ‡จ๐Ÿ‡ฆ

I must be old. I really donโ€™t understand emoji reactions. If I say โ€œIโ€™m on the bus and will be there in half an hourโ€ to the group message, why do five people need to react with the bus emoji? A thumbs up or a heart or a smile I get. It communicates some sort of information. You like it, or youโ€™re happy, or whatever. But all reacting โ€œbusโ€ communicates is thatโ€ฆthe word bus was in the original message, and you recognized it! Yes! Good for you! You recognized the word bus! Do you want a cookie or something?

8
4
0
it's ok, gcc
1
2
1

idk, why youโ€™re asking me

6
4
0

talking about wild product design, I recently stumbled upon a british eBay offer that I don't wanna keep from you.

RIGHT ANGLE COMPUTER

(link: https://www.ebay.co.uk/itm/286969765517)

44
7
0

BSD, Lunix, Debian and Mandrake are all versions of an illegal hacker operation system, invented by a Soviet computer hacker named Linyos Torovoltos, before the Russians lost the Cold War. It is based on a program called "xenix", which was written by Microsoft for the US government. These programs are used by hackers to break into other people's computer systems to steal credit card numbers. They may also be used to break into people's stereos to steal their music, using the "mp3" program. Torovoltos is a notorious hacker, responsible for writing many hacker programs, such as "telnet", which is used by hackers to connect to machines on the internet without using a telephone.

1
3
0

Host a website from an old phone using

https://far.computer/how-to/

1
4
0

Congratulations to everybody who worked on the recently tagged megapixels 2 release! ๐ŸŽ‰

Is anybody interested in taking over maintainership of the Alpine Linux package, packaging libmegapixels as well and upgrading Megapixels to version 2? I'm the current maintainer and probably won't have time for this soon. I'm happy to review the diff in APKBUILDs though.
If so, just send a merge request with your changes against aports, thanks :)

https://gitlab.alpinelinux.org/alpine/aports/-/tree/master/community/megapixels

1
2
0

Do you consent to have your picture taken at ?

7% Yes
92% Ask later
9
3
0
Show older